Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 621 - 640 results of 2,784 for search '"\"((((\\"useds OR \"useddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 621

    Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram by TIAN Yuechi, LI Fenghua, ZHOU Zejun, SUN Zhe, GUO Shoukun, NIU Ben

    Published 2024-08-01
    “…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
    Get full text
    Article
  2. 622
  3. 623

    Quantum Privacy Comparison with <i>R<sub>y</sub></i> Rotation Operation by Min Hou, Yue Wu

    Published 2025-03-01
    “…This paper presents a novel quantum privacy comparison (QPC) protocol that employs <i>R<sub>y</sub></i> rotation operations to enable two participants to securely compare their binary secrets without disclosing the actual data to any party except for the comparison result. …”
    Get full text
    Article
  4. 624
  5. 625

    Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub by Yu (Andrew) Liu, Gurpreet Kaur, Natasha Kholgade Banerjee, Sean Banerjee

    Published 2025-08-01
    “…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
    Get full text
    Article
  6. 626

    Ethical and legal considerations governing use of health data for quality improvement and performance management: a scoping review of the perspectives of health professionals and a... by Tim Shaw, Kevin Leow, Ian Kerridge, Cameron Stewart, Anna Janssen, Kavisha Shah

    Published 2025-04-01
    “…Health administrators additionally emphasised the importance of good governance and data stewardship to improving professional engagement with performance data, but privacy remains a key barrier.Conclusions The growing interest in using health data for quality improvement and performance management requires health services to address barriers to utilisation of performance data. …”
    Get full text
    Article
  7. 627

    Determinants of Continuous Smartwatch Use and Data-Sharing Preferences With Physicians, Public Health Authorities, and Private Companies: Cross-Sectional Survey of Smartwatch Users by Anthony James Goodings, Kayode Philip Fadahunsi, Derjung M Tarn, Jennifer Lutomski, Allison Chhor, Frances Shiely, Patrick Henn, John O'Donoghue

    Published 2025-08-01
    “…Wilcoxon signed-rank tests were used to analyze user comfort in sharing data, comparing noninternet- versus internet-based sharing methods and fully versus partially anonymized data. …”
    Get full text
    Article
  8. 628

    Advancing Early Detection of Major Depressive Disorder Using Multisite Functional Magnetic Resonance Imaging Data: Comparative Analysis of AI Models by Masab Mansoor, Kashif Ansari

    Published 2025-07-01
    “…MethodsWe used functional magnetic resonance imaging data from 1200 participants (600 with early-stage MDD and 600 healthy controls) across 3 public datasets. …”
    Get full text
    Article
  9. 629
  10. 630

    ChildDiffusion: Unlocking the Potential of Generative AI and Controllable Augmentations for Child Facial Data Using Stable Diffusion and Large Language Models by Muhammad Ali Farooq, Wang Yao, Peter Corcoran

    Published 2025-01-01
    “…In this research, we propose the ChildDiffusion framework, designed to generate photorealistic child facial data using diffusion models. The framework integrates intelligent augmentations via short text prompts, employs various image samplers, and leverages ControlNet for enhanced model conditioning. …”
    Get full text
    Article
  11. 631

    De novo non-canonical nanopore basecalling enables private communication using heavily-modified DNA data at single-molecule level by Qingyuan Fan, Xuyang Zhao, Junyao Li, Ronghui Liu, Ming Liu, Qishun Feng, Yanping Long, Yang Fu, Jixian Zhai, Qing Pan, Yi Li

    Published 2025-05-01
    “…Abstract Hidden messages in DNA molecules by employing chemical modifications has been suggested for private data storage and transmission at high information density. …”
    Get full text
    Article
  12. 632

    Deriving and validating a risk prediction model for long COVID-19: protocol for an observational cohort study using linked Scottish data by Jennifer K Quint, Aziz Sheikh, Chris Robertson, Srinivasa Vittal Katikireddi, Emily Moore, Colin R Simpson, Luke Daines, Eleftheria Vasileiou, Syed Ahmar Shah, Rachel H Mulholland, Vicky Hammersley, Steven Kerr, Ting Shi, David Weatherill, Elisa Pesenti

    Published 2022-07-01
    “…In this protocol, we describe plans to develop a prediction model to identify individuals at risk of developing long-COVID.Methods and analysis We will use the national Early Pandemic Evaluation and Enhanced Surveillance of COVID-19 (EAVE II) platform, a population-level linked dataset of routine electronic healthcare data from 5.4 million individuals in Scotland. …”
    Get full text
    Article
  13. 633

    STF-LPPVA: Local Privacy-Preserving Method for Vehicle Assignment Based on Spatial–Temporal Fusion by Lei Tang, Zhengxin Cao, Xin Zhou, Junzhe Zhang, Junchi Ma

    Published 2025-01-01
    “…There are user privacy risks in cloud-based vehicle dispatch platforms due to the unauthorized collection, use, and dissemination of data. …”
    Get full text
    Article
  14. 634

    Recent Advances in Federated Learning for Connected Autonomous Vehicles: Addressing Privacy, Performance, and Scalability Challenges by Asad Ali, Huang Jianjun, Ayesha Jabbar

    Published 2025-01-01
    “…FL presents a decentralized infrastructure that allows collaborative learning, while also ensuring data privacy, as CAVs increasingly rely on machine learning to process large amounts of sensor data. …”
    Get full text
    Article
  15. 635

    Using fuzzy decision support to create a positive mental health environment for preschoolers by Xinyue Li

    Published 2025-04-01
    “…To assess their mental health before starting school, preschoolers need early detection, intervention, and assessment. However, data shortages, heterogeneity, privacy issues, model interpretability, and generalization restrictions hamper the review process. …”
    Get full text
    Article
  16. 636

    Impact of Normalization Techniques on Synthetic Load Profile Generation Using Deep Generative Models by Luis H. T. Bandoria, Walquiria N. Silva, Madson C. De Almeida

    Published 2025-01-01
    “…However, the impact of data normalization on their performance remains insufficiently explored. …”
    Get full text
    Article
  17. 637
  18. 638

    Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks by Liang Liu, Zhenhai Hu, Lisong Wang

    Published 2019-07-01
    “…The algorithm does not rely on the pre-established topology but considers only the query area that the user is interested in, abandoning all nodes to participate in distributing the query messages while gathering the sensory data in the query range. To protect node data privacy, Shamir’s secret sharing technology is used to prevent internal attackers from stealing the sensitive data of the surrounding nodes. …”
    Get full text
    Article
  19. 639

    Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT) by zahra eskandari

    Published 2023-01-01
    “…Federated learning is a distributed data analysis approach used in many IoT applications, including IoMT, due to its ability to provide acceptable accuracy and privacy. …”
    Get full text
    Article
  20. 640

    Enhancing Privacy in IoT-Enabled Digital Infrastructure: Evaluating Federated Learning for Intrusion and Fraud Detection by Amogh Deshmukh, Peplluis Esteva de la Rosa, Raul Villamarin Rodriguez, Sandeep Dasari

    Published 2025-05-01
    “…To address these issues, federated learning (FL) using a flower framework is utilized to protect the privacy of individual organizations while still collaborating through separate models to create a unified global model. …”
    Get full text
    Article